Analyze PCAP in your browser

Visualize network flows, spot anomalies, and extract files from packet captures without installing anything.

HTTP, DNS, IPv4, IPv6 Interactive traffic charts Object extraction

Free up to 25 MB. No registration required. Public result page by default.

Choose a PCAP to analyze

Or drag and drop one file here. Upload starts only after you click Upload PCAP and Analyze.

.pcap .pcapng .cap

Click or Drop to Select

Free plan limit: 25 MB No signup Mode: Public

Upload starts only after confirmation.

Free Tier Public Analysis

Free uploads create a public result page after processing.

Use public mode for sample captures and sanitized traces. If the PCAP contains internal hosts, credentials, or client data, use private analysis.

  • 25 MB per file on the free tier
  • No registration required
  • Paid options unlock confidentiality and larger limits

Working with PCAP Files

Windows Capture Guide

Generate high-fidelity .pcap files using professional tools like Wireshark.

1

Select your active Network Adapter from the interface list.

2

Click the Shark Icon to initiate real-time packet capture.

Need help? Explore the Official Wireshark FAQ.

Unix Terminal Capture

Leverage the power of tcpdump for lightweight, high-performance packet analysis.

Command
sudo tcpdump -i eth0 -w dump.pcap

Ensure the resulting file has correct read permissions for processing:

Permissions
chmod 644 dump.pcap

Pro Tip: Use -v for verbose output.

After Upload

What You See Next

Immediate Result Page

Open the generated link to inspect decoded traffic, extracted objects, and visual summaries in the browser.

Visibility Matches Your Mode

Private uploads stay in your workspace. Public uploads are visible in the community feed.

Included Views

  • Protocol breakdown
  • Extracted HTTP objects
  • Interactive traffic charts
  • Wireless findings

Need confidentiality, private storage, or larger uploads? Review plans and credits.

Before You Upload

Handle Sensitive Captures Carefully

PCAP and PCAPNG files often contain internal hosts, session data, credentials, and user content. If the capture is tied to a customer environment or an active security incident, avoid public mode and use private analysis instead.